• Training
    • Overview
    • Schedule
    • Catalog
    • Training Reviews
    • Delivery Options
    • About Our Training
    • Exam Pass Guarantee
    • Student Funding
    • Alpine Security GSA Schedule
    • DoD 8570/8140 Approved Training
  • Services
    • Overview
    • Medical Device Cybersecurity
    • CISO-as-a-Service
    • Penetration Testing
    • DFARS and CMMC Compliance Audit
    • Breach Prevention Audit
    • Cybersecurity Risk Management Program
    • Enterprise Security Audit
    • Alpine Services Reviews
  • Blog
  • News
  • About Us
    • About Us
    • Meet The Team
    • Why Alpine?
  • Contact
CISO Global (formerly Alpine Security)CISO Global (formerly Alpine Security)
CISO Global (formerly Alpine Security)CISO Global (formerly Alpine Security)
  • Training
    • Overview
    • Schedule
    • Catalog
    • Training Reviews
    • Delivery Options
    • About Our Training
    • Exam Pass Guarantee
    • Student Funding
    • Alpine Security GSA Schedule
    • DoD 8570/8140 Approved Training
  • Services
    • Overview
    • Medical Device Cybersecurity
    • CISO-as-a-Service
    • Penetration Testing
    • DFARS and CMMC Compliance Audit
    • Breach Prevention Audit
    • Cybersecurity Risk Management Program
    • Enterprise Security Audit
    • Alpine Services Reviews
  • Blog
  • News
  • About Us
    • About Us
    • Meet The Team
    • Why Alpine?
  • Contact

Replace Windows Task Manager with Process Explorer for Easy Malware Detection

Replace Windows Task Manager with Process Explorer for Easy Malware Detection

Windows Task Manager serves a purpose, but we recommend you replace it with Process Explorer for many reasons.  A few of the  reasons for using Process Explorer:

  1. It is Free.

  2. It easily integrates with VirtusTotal.

  3. It shows process dependencies / process trees.

Here is the information Windows Task Manager shows you:

 Windows Task Manager Windows Task Manager

Here’s the same information shown with Process Explorer:

 Process Explorer Process Explorer

As you can see in Process Explorer – the process “Cain.exe” was flagged as malicious by 16 out of 54 Anti-malware vendors on VirusTotal.

How do you replace Windows Task Manager with Process Explorer?  Here are the steps:

1. Download Process Explorer or the entire Sysinternals Suite from here, the legit Microsoft site:

  • Process Explorer

  • Sysinternals

We recommend the Sysinternals Suite, as it has many other useful tools.


2. After you extract either download in Step 1, run Process Explorer (procexe.exe) by double-clicking on it.


3. After Process Explorer starts and you accept the EULA, go to File and choose Show Details for All Processes


4. Go to Options and choose Replace Task Manager


5. Go to Options and choose VirusTotal.com and select Check VirusTotal.com


Tags: MalwareMark RussinovichProcess ExplorerSysinternalsTask ManagerVirtusTotal
Share

You also might be interested in

7 Common Cybersecurity Portmanteaus: Their Meanings Explained
Masked Hacker in a Hoodie Standing in Corporate Data Center with Rows of Working Rack Servers.

7 Common Cybersecurity Portmanteaus: Their Meanings Explained

Mar 19, 2018

The 8 Most Common Cyber Attacks and How to Stop Them
Glittering blue stamp: Cyber warfare background with some smooth lines

The 8 Most Common Cyber Attacks and How to Stop Them

Aug 11, 2018

Malware Research Explained, Part 1

Malware Research Explained, Part 1

May 14, 2019

BLOG SEARCH:

Connect with Us

Interested in our cybersecurity training or services? Complete the form below and we’ll get back with you right away. We appreciate your interest.


Recent Posts

  • The State of Ransomware 2020
  • National Cybersecurity Awareness Month: 6 Things to Practice During the Month
  • Cybersecurity Checklist for Business Closures, Consolidations, and Acquisitions
  • What Is DevSecOps?
  • Cybersecurity and a Remote Workforce: What Does the Future Look Like?
  • 6 Penetration Testing Trends to Have on Your Cybersecurity Radar
  • Incorporating Privacy and Security by Design into MedTech
  • What is the Difference Between CMMC, DFARS, and NIST 800-171?
  • At Risk: Medical Device Cybersecurity Vulnerabilities Expose Patients to Life-threatening Consequences
  • 5 Reasons to Hire a Fractional CISO
  • Why Private Cybersecurity Training Matters for Your Organization
  • Is the CEH Certification Right For You?
  • Internal Penetration Test vs Vulnerability Assessment: Which is Right for You?
  • Best Beginner Cybersecurity Certification to Get
  • Penetration Testing for Compliance: The Top 5 Laws and Regulations that Require Testing

Alpine Security is a member of the CISO Global family of companies.

Contact Us:

  • CISO Global
  • 6900 E. Camelback Road, Suite 900 Scottsdale, AZ 85251
  • 480-389-3444
  • info@ciso.inc
  • www.ciso.inc

Get Info

About Our Training
About Our Services
Meet the Team
Blog
Terms of Use
Privacy Policy

Join The Community

  • Facebook
  • LinkedIn
  • Twitter
  • YouTube
  • Mail

Proud Partners

© 2021 · Alpine Security, a Cerberus Sentinel Company

Next